Your business is too important to simply invite hackers in to torment you and encrypt your data or otherwise paralyze your operations. It happens every day in the small business arena, and the nightmare that one client experienced need not happen to you. Keep in mind, hackers have automated tools to exploit your vulnerabilities for fun and profit. You need to shift from knowing this is an issue to taking action to protect your assets.

It is time to fully realize that your business is under attack by malicious hackers. You need to lower your attack vector so hackers are unable to exploit your company.

Here’s what happened recently to a client that should have acted before the problem arose:

A manufacturing company choose to stay vulnerable by ignoring smart IT advice. They kept their Windows 2003 Server running, they still had Windows XP machines connected to the network, and they had some scattered USB drives on desktop devices for a “local backup”.

This “open invitation” led a hacker to install a crypto virus on a server, as well as gain access to all of the other easy-to-identify servers in the network, without a password. The company’s data were encrypted and held for ransom. Even the backup data on the USB drives were encrypted, making an up-to-date recovery impossible. Fortunately, and after 80 hours of IT consulting work to restore data, the company was able to use a 7-month old backup file to at least partially recover and become functional. All avoidable, of course, with a sound data protection and technology deployment plan. Migrating away from XP, once and for all, and upgrading to current server software along with smart data backup is a good start.

You might be unknowlingly leaving the door wide open for hackers to come in and ruin your business. Whether you are highly vulnerable, or as protected as can be is a choice. This choice is clear as you take a close look at your exposure.

Hackers have enough tools to succeed without you making it too easy for them. When they find a company that is “just begging” to be hacked, they get a certain thrill in punishing the unsuspecting or ignorant victims, and those who are in full denial about cyberthreats.

My message:

Make it difficult for hackers by taking steps to lower your vulnerability. Smart IT security decisions can help you reduce exposure and minimize your attack vector.

Make it difficult for hackers by giving servers on your network disguised names, removing the word “server”. Instead of “factory server” call it by a desktop name, such as Bill’s Desktop 01. Something that a hacker will not bother to attack.

USB drives as a back-up strategy is foolish. Yes, backup to a USB as a backup to your backup is it helps you sleep better, but do not leave it connected to the machine. Crypto viruses will encrypt the data on your USB drives, too! Your disaster recovery plan should include an ioSafe fireproof solution. We can help you select the right ioSafe solution.

Your Decision:

Choose the maximum protection you can afford for the risk level you can accept. We’ll assess and advise you, and help you implement the best solution. Since way back in 1986, when CTS Services, Inc. started, our goal has been to keep your business up and running. Now, we’ve added to that value statement; We help you protect your company’s IT assets. Better.

Call to discuss your fears and concerns, and to address your questions about risking your business to hackers.

Sincerely,

Michelle CarlowPresident, CTS Services, Inc.

PS: References: I invite you to explore the below links, or simply google the phrase “IT attack vector” and discover what might be a new vocabulary in your IT or business world. Then, if you are feeling vulnerable and at risk, call to discuss a strategy for protecting your company better. Our resident IT security expert staff can help you implement a smart strategy.